Based on TrueCrypt, it adds enhanced security to the algorithms used for system and partitions encryption making it immune to new developments in brute-force attacks.

This enhanced security adds some delay only to the opening of encrypted partitions without any performance impact to the application use phase. This is acceptable to the legitimate owner but it makes it much more harder for an attacker to gain access to the encrypted data.